npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@vigolium/piolium

v0.0.8

Published

Multi-phase security audits with specialist sub-agents, isolated context windows, capped concurrency, and resumable state — packaged as a Pi extension.

Readme

Piolium Audit

Piolium

Piolium is Vigolium's Pi-native repository security audit agent. It runs multi-phase source audits with specialist sub-agents, resumable state, controlled concurrency, PoC generation, and final reporting.

Piolium is packaged as a Pi extension. Once installed, it registers /piolium-* slash commands inside Pi sessions and also provides a standalone piolium launcher when installed through the quick installer.

[!WARNING] Full audit runs can take hours. Run Piolium only against repositories you trust or inside a sandboxed working directory.

Install

Piolium is a Pi package, so install Pi first if you don't have it:

bun add -g @earendil-works/pi-coding-agent

Recommended — install Piolium into your Pi from npm:

pi install npm:@vigolium/piolium

This registers the /piolium-* slash commands in your Pi sessions. Run them with pi -p "/piolium-balanced --fresh" or inside an interactive pi session.

From source (development)

For development from this checkout, you need Pi (the pi CLI) and Bun ≥ 1.1.0 already on your PATH:

bun install
pi install ./   # in-place dev install; edits in this checkout apply immediately

Quick Start

Run an audit with a one-shot command:

pi -p '/piolium-deep'

Or start an interactive pi session and type a command such as:

/piolium-deep ../target-repo --fresh
/piolium-status

Commands

| Command | Purpose | | --- | --- | | /piolium-help | Show commands, flags, and examples. | | /piolium-status [path] | Show audit progress. | | /piolium-lite [path] [--fresh] | Quick recon, secrets scan, and fast SAST. | | /piolium-balanced [path] [--fresh] | Default audit with PoCs and report. | | /piolium-deep [path] [--fresh] [P1..P17] | Full deep audit, optionally rerunning selected phases. | | /piolium-confirm [path] [--fresh] [https://target] | Confirm existing findings live or with tests. | | /piolium-diff [path] [--since=<sha>] | Scan changed files since an audited commit. | | /piolium-revisit [path] [--fresh] | Anti-anchored second pass over an audit. | | /piolium-merge [path] --dir=<tree> --dir=<tree> | Merge and dedupe result trees. | | /piolium-export [path] [--format=json\|md-dir] | Export filtered findings with owner labels. | | /piolium-learn [path] [--apply] | Suggest or apply project-local candidate matchers. | | /piolium-smoke [path] [prompt] | Verify runner/provider wiring. | | /piolium-longshot [path] [--fresh] [--limit=N] | File-by-file vulnerability hunt. |

Most commands accept an optional target directory as the first argument.

Deep mode phases

/piolium-deep runs 17 phases (P1P17) in five stages. Pass phase ids to rerun only those (e.g. /piolium-deep . P4 P10):

  • Recon & modelingP1 intelligence & dependency risk, P2 patch history & bypass review, P3 architecture & threat model.
  • AnalysisP4 static analysis & triage, P5 authorization & access control, P6 state machine & concurrency, P7 spec/parser/framework-contract gaps, P8 manual attack-surface probe, P9 cross-service data flow.
  • Adversarial validationP10 adversarial review chamber, P11 false-positive verification, P12 variant search.
  • PoC & reportingP13 proof-of-concept construction, P14 per-finding report drafting, P15 final report assembly, P16 finding verification.
  • CleanupP17 removes transient workspaces and tool artifacts.

See docs/phase-reference.md for per-phase behavior and outputs.

Output

All audit artifacts are written under a piolium/ directory in the target repository:

piolium/
  audit-state.json          # resumable run state and per-phase status
  attack-surface/           # durable knowledge base: recon, SAST, probes, threat model
  findings-draft/           # candidate findings, named by the phase that produced them
  findings/<id>-<slug>/      # final findings: draft.md, report.md, poc.*, evidence/
  final-audit-report.md     # consolidated report across finalized findings
  tmp/piolium/runs/<id>/     # per-agent transcripts (removed by cleanup phases)

Not every command writes every path — Lite skips the deep workspaces, while Deep adds the full attack-surface/ corpus plus variant-summary.md and, when findings confirm, confirmation-report.md. For a finished audit, start with final-audit-report.md, then each findings/<id>-<slug>/report.md.

Useful references:

Security Note

Pi packages execute code locally. Extensions run TypeScript, skills can ask the model to run shell commands, and Piolium's audit agents use filesystem and shell tooling. Treat Piolium as trusted local tooling and sandbox untrusted targets.

License

Piolium is made with ♥ by @j3ssie and it is released under the MIT license.